Connect with us
DAPA Banner

Tech

Russian hackers exploit recently patched Microsoft Office bug in attacks

Published

on

Russian hackers exploit recently patched Microsoft Office bug in attacks

Ukraine’s Computer Emergency Response Team (CERT) says that Russian hackers are exploiting CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office.

On January 26, Microsoft released an emergency out-of-band security update marking CVE-2026-21509 as an actively exploited zero-day flaw.

CERT-UA detected the distribution of malicious DOC files exploiting the flaw, themed around EU COREPER consultations in Ukraine, just three days after Microsoft’s alert.

Wiz

In other cases, the emails impersonated the Ukrainian Hydrometeorological Center and were sent to over 60 government-related addresses.

However, the agency says that the metadata associated with the document shows that it was created one day after the emergency update.

Advertisement

The Ukrainian CERT attributed these attacks to APT28, a nation-state threat actor also known as Fancy Bear and Sofacy and associated with Russia’s General Staff Main Intelligence Directorate (GRU).

Opening the malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth).

Malicious document triggering exploitation of CVE-2026-21509
Malicious document triggering exploitation of CVE-2026-21509
Source: CERT-UA

“The scheduled task execution leads to termination and restart of the explorer.exe process, which, among other things, thanks to COM hijacking, ensures loading of the “EhStoreShell.dll” file,” CERT-UA says in the report.

“This DLL executes shellcode from the image file, which in turn ensures the launch on the computer of the COVENANT software (framework).”

This is the same malware loader CERT-UA linked to APT28 attacks in June 2025, which exploited Signal chats to deliver the BeardShell and SlimAgent malware to government organizations in Ukraine.

Advertisement

The agency reports that COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. Monitoring for connections associated with the platform, or blocking them completely, should improve the defense against this threat.

Subsequent investigations revealed that APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine. In one observed case, the domains supporting the attacks were registered on the same day.

Organizations are recommended to apply the latest security update on Microsoft Office 2016, 2019, LTSC 2021, LTSC 2024, and Microsoft 365 Apps. For Office 2021 and later, ensure users restart applications to allow the updates to be applied.

If immediate patching is impossible, it is recommended to implement the registry-based mitigation instructions in our original coverage of the flaw.

Advertisement

Microsoft previously stated that Defender’s Protected View adds an extra layer of defense by blocking malicious Office files originating from the Internet unless explicitly trusted.

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

NVIDIA’s NemoClaw Gives Personal AI Agents the Safety Companies Need

Published

on

NVIDIA NemoClaw OpenClaw AI Agents
OpenClaw took the tech industry by surprise earlier this year when an Austrian engineer created the first version in roughly an hour. This small project swept through the community like wildfire as the most open-source endeavor on record, allowing anyone to set up a personal AI agent to operate directly on their own PC and accomplish tasks like organizing files or pounding out code without sending any data off to who knows where. At GTC, NVIDIA introduced NemoClaw, a software add-on for OpenClaw that can be installed with a single command. This new layer includes the security features and privacy controls that transform these agents from fun little experiments to useful business solutions.



NemoClaw is simple to integrate into your existing setup since it introduces OpenShell, a runtime that isolates each agent in its own small bubble. Then you can create rules in plain text files that specify which folders the agent may browse, which networks it can connect to, and which external services it can access. Everything else, and we mean everything, is off limits, and every step they make leaves a clear paper trail for you to follow.


Plaud Note Pro AI Voice Recorder, Transcribe & Summarize with AI, App Control, Note Taker for Meetings…
  • AI-POWERED TRANSCRIPTION & MULTI-DIMENSIONAL SUMMARIES: Plaud Note Pro is your professional voice transcriber, delivering high-accuracy transcription…
  • ENHANCED CONTEXT WITH MULTIMODAL INPUT: Capture audio, type notes, add images, and press to highlight key moments for richer context. During…
  • CHAT WITH YOUR RECORDINGS USING “ASK Plaud”: Unlock deeper insights with this interactive AI. Ask questions, extract key points, draft emails, and get…

NVIDIA is marrying this with some of their own open models known as Nemotron, which run locally on whatever hardware is available. You’re talking everything from RTX-powered laptops to entire workstations and dedicated AI systems. When you need a little more horsepower, you can utilize a privacy router to connect to more powerful cloud models while keeping all of your sensitive information in-house. The end result is a framework that allows your agents to work in a mix of local and remote resources while maintaining tight boundaries.


Companies are already putting these components to use in real-world situations. Cisco runs agents that detect security flaws, verify databases, map affected devices, and create a thorough remediation plan, all of which must be checked against the rules in real time. Box uses the same framework to handle invoices and contracts, using abilities that work well with existing access levels. NVIDIA has also partnered with Salesforce, CrowdStrike, and a few more large brands to achieve the same level of control across all of their technologies. OpenClaw agents run 24 hours a day, seven days a week on personal computers, professional workstations, and servers without interfering with anything else. If you have dedicated hardware, you can keep them up and running for hours, if not days, while they work.

Advertisement

NVIDIA NemoClaw OpenClaw AI Agents
It is currently available as an early preview through official sources, such as on Github. Users can begin testing right away, although NVIDIA says some rough edges must be ironed out before they are formally put into production. Developers have complete access to the toolkit, which includes sample models, runtimes, and guidance for creating their own agents. Jensen Huang referred to OpenClaw as the operating system for personal AI, indicating a trend toward software that can be instructed to do things. Peter Steinberger, the original creator of OpenClaw, sees this combination as a method for users to design and run their own secure assistants.

Source link

Continue Reading

Tech

Polymer Blend Capacitor Packs Four Times More Energy

Published

on

As electronics demand higher energy density, one component has proved challenging to shrink: the capacitor. Making a smaller capacitor usually requires thinning the dielectric layer or electrode surface area, which has often resulted in a reduction of power. A new polymer material could help change that.

In a study published 18 February in Nature, a Pennsylvania State University-led team reported a capacitor crafted from a polymer blend that can operate at temperatures up to 250 °C while storing roughly four times as much energy as conventional polymer capacitors. Today’s advanced polymer capacitors typically function only up to about 100 °C, meaning engineers often rely on bulky cooling systems in high-power electronics. The research team has filed a patent for the polymer capacitors and plans to bring them to market.

Capacitors deliver rapid bursts of energy and stabilize voltage in circuits, making them essential in applications ranging from electric vehicles and aerospace electronics to power-grid infrastructure and AI data centers. Yet while transistors have steadily shrunk with advances in semiconductor manufacturing, passive components such as capacitors and inductors have not scaled at the same pace.

“Capacitors can account for 30 to 40 percent of the volume in some power electronics systems,” says Qiming Zhang, an electrical engineering researcher at Penn State and study author, explaining why it’s important to make smaller capacitors.

Advertisement

A plastics blend more powerful than its parts

The research team combined two commercially available engineered plastics: polyetherimide (PEI), originally developed by General Electric and widely used in industrial equipment, and PBPDA, known for strong heat resistance and electrical insulation. When processed together under controlled conditions, the polymers self-assemble into nanoscale structures that form thin dielectric films inside capacitors. Those structures help suppress electrical leakage while allowing the material to polarize strongly in an electric field, allowing greater energy storage.

The resulting material exhibits an unusually high dielectric constant—a measure of how much electrical energy a material can store. Most polymer dielectrics have values around four, but the blended polymer dielectric in the new work had a value of 13.5.

“If you look at the literature up to now, no one has reached this level of dielectric constant in this type of polymer system,” Zhang says. “Putting two commonly used polymers together and seeing this kind of performance was a surprise to many people.”

Because the material can remain operational even at elevated temperatures—such as those from extreme environmental heat or hot spots in densely built components—capacitors built from this polymer could potentially store the same amount of energy in a smaller package.

Advertisement

“With this material, you can make the same device using about [one-fourth as much] material,” Zhang says. “Because the polymers themselves are inexpensive, the cost does not increase. At the same time, the component can become smaller and lighter.”

How the polymer mix improves capacitors

The researchers’ finding is “a big advancement,” says Alamgir Karim, a polymer research director at the University of Houston who was not involved in the Penn State development. “Normally when you mix polymers, you don’t expect the dielectric constant to increase.”

Karim says the effect likely arises from nanoscale interfaces created when the polymers partially separate. “At about a 50–50 mixture, the polymers don’t fully mix and instead create a very large interfacial area,” he says. “Those interfaces may be where the unusual electrical behavior comes from.”

If the material can be produced at scale, it could help address a key bottleneck in high-power electronics. Higher-temperature capacitors could reduce cooling requirements and allow engineers to pack more power into smaller systems—an advantage for aerospace platforms, electric vehicles, the electric grid, and other high-temperature environments.

Advertisement

But translating the concept from laboratory methods to commercial manufacturing may present challenges, says Zongliang Xie, a postdoctoral researcher at the Lawrence Berkeley National Laboratory. The Penn State team is now producing small dielectric films, but industrial capacitor manufacturing typically requires continuous rolls of material that can extend for kilometers.

“Industry generally prefers extrusion-based processing because it’s easier and cheaper to control,” Xie says. “Scaling to produce great lengths of film while maintaining the same structure and performance could complicate matters. There’s potential, but it’s also challenging.”

Still, researchers say the discovery demonstrates that new performance limits may still be unlocked using familiar materials. “Developing the material is only the first step,” Zhang says. “But it shows people that this barrier can be broken.”

From Your Site Articles

Advertisement

Related Articles Around the Web

Source link

Continue Reading

Tech

Dune Part Three Trailer Reveals the Weight Paul Atreides Carries After Victory

Published

on

Dune Part Three Trailer
Crowds flocked to the AMC Century City theater in Los Angeles this morning for a special IMAX event featuring the first look at the concluding chapter in Denis Villeneuve’s “Dune” saga. Zendaya, Robert Pattinson, Javier Bardem, and Anya Taylor-Joy came out to meet the fans in person, while Timothée Chalamet sent in a video greeting via his phone. The energy in the room altered suddenly, as this plot picks up 17 years after the previous film finished and revolves around what happens when someone gains too much power.



The footage starts with Paul and Chani having a private conversation about what they could name their future child. Ghanima for a girl and Leto for a male, but even it felt tight, a result of how they’d begun to drift apart in the last film. Within seconds, the screen was filled with broader pictures of Paul and Stilgar exploring the cosmos on new planets, as their reach for the Atreides empire grew rapidly. Large sights of fleets of ships slicing across alien sky, as well as soldiers moving across rocky terrain far from Arrakis.

Sale


LEGO Icons Dune Atreides Royal Ornithopter 10327, Collectible Dune Inspired Model for Build and Display…
  • Dune building set for adults – Collectible LEGO Icons Dune Atreides Royal Ornithopter building project for fans of the Dune 2021 movie
  • What’s in the box? – Everything you need to craft a LEGO replica of the Dune Atreides Royal Ornithopter aircraft with foldout, flappable wings and…
  • Minifigure character lineup – Includes Paul Atreides, Lady Jessica, Gurney Halleck, Chani, Leto Atreides, Liet Kynes, Duncan Idaho and Baron…

Dune Part Three Screenshot
Chani showed up shortly, this time fighting her way through a violent battle scene. A sandworm can be spotted in the midst of it all, balancing on its back before diving into the melee. Just as Chani was in the middle of it, Alia, now all grown up and played by Anya Taylor-Joy, stepped into several critical frames of her own.

Dune Part Three Screenshot
Paul himself provides some of the low, echoing vocals that run under the music throughout, while Robert Pattinson appears as Scytale, the shape-shifter who is as slick as ever and whose loyalties are impossible to read. Jason Momoa has also returned, and Duncan Idaho was seen briefly. Returning cast members include Rebecca Ferguson (Lady Jessica), Florence Pugh (Princess Irulan), and Javier Bardem (Stilgar), who join an already impressive group.

Dune Part Three Screenshot
Villeneuve described this installment as a fast-paced thriller centered on action and pressure. Note how, even in the midst of all that upheaval, Paul and Chani’s link remains strong, as he describes it as a steady pulse that runs through everything, with a focus primarily on the two of them. He also emphasizes how the large jump in time allows Alia to become much more vital to the tale, which the previous films just hinted at. Also, it appears that Hans Zimmer has returned to the soundtrack. Fans who left the theater today are already counting down the days until December 18, 2026, when the film is released.

Advertisement

Source link

Continue Reading

Tech

These Sonos Over-Ear Headphones Are $100 Off

Published

on

If your house is already lined with Sonos products, you may want a pair of over-ear headphones that know how to play nice with your other speakers. As it turns out, Sonos actually makes a pair of over-ear headphones, the Ace, and they’re currently just $299 on Amazon. That’s a great deal, and one that almost ties the all-time low price for these cans.

Not only do the Sonos Ace integrate with your existing Sonos setup via Bluetooth, they’re also great headphones in their own right. They have a crisp, flat audio profile, something Sonos is known for, and our reviewer Parker Hall specifically called out their ability to handle any song “with a good bass line.” They have great detail, with a dynamic sound that handles a variety of genres well.

They’re also one of the more comfortable headsets you can buy, largely thanks to their impressive lightness. At just 11 ounces, it’s easy to feel like you’re wearing nothing at all, and they have good clamping force on the side that helps take a lot of the pressure off the top of your head. If fit and finish are a top priority for your headset, the Sonos Ace have both by the truckload.

The ANC is right up there with the best headsets you can buy, and in particular handled low-frequency rumbles adeptly. Transparency mode is excellent too, with a clarity to conversations that doesn’t have you feeling like you’re talking to someone through a tin can. While they lack some of the convenience features found on other headsets, they make up for it with multipoint pairing, and you can adjust all the settings to your liking in the Sonos app.

Advertisement

While the Sonos Ace are available in multiple colors, I only spotted the black model marked down to the $300 sale price. As I write this, the white model is in stock at a slightly higher $365, which may or may not be worth it, depending on how much the aesthetics matter to you. If you’re not sold on the Sonos Ace, make sure to check out our full roundup of the best headphones, with hands-on testing from our team of audio experts.

Source link

Continue Reading

Tech

The Pentagon is developing alternatives to Anthropic, report says

Published

on

After their dramatic falling-out, it doesn’t seem as though Anthropic and the Pentagon are getting back together.

Instead, the Pentagon is building tools to replace Anthropic’s AI, according to a Bloomberg conversation with Cameron Stanley, the chief digital and AI officer at the Pentagon.

“The Department is actively pursuing multiple LLMs into the appropriate government-owned environments,” he said. “Engineering work has begun on these LLMs, and we expect to have them available for operational use very soon.”

Anthropic’s $200 million contract with the Department of Defense (DOD) broke down over the last several weeks after the two parties failed to come to an agreement over the degree to which the military could obtain unrestricted access to Anthropic’s AI.

Advertisement

While Anthropic sought to include a contractual clause that prohibits the Pentagon from using its AI for mass surveillance of Americans or to deploy weapons that can fire without human intervention, the Pentagon didn’t budge. Instead, OpenAI swooped in and made its own agreement with the Pentagon. The Department of Defense — known under the Trump administration as the Department of War — also signed an agreement with Elon Musk’s xAI to use Grok in classified systems.

It makes sense, then, why the Pentagon would be working on phasing Anthropic’s technology out of its workflows. While some reports said there was a small possibility that Anthropic would reconcile with the Pentagon, this news suggests that the government is preparing to forge ahead without them.

In fact, Defense Secretary Pete Hegseth has declared Anthropic a supply-chain risk, a designation usually reserved for foreign adversaries, which bars companies that work with the Pentagon from working with Anthropic as well. Anthropic is challenging this designation in court.

Source link

Advertisement
Continue Reading

Tech

Nvidia’s agentic AI stack is the first major platform to ship with security at launch, but governance gaps remain

Published

on

For the first time on a major AI platform release, security shipped at launch — not bolted on 18 months later. At Nvidia GTC this week, five security vendors announced protection for Nvidia’s agentic AI stack, four with active deployments, one with validated early integration.

The timing reflects how fast the threat has moved: 48% of cybersecurity professionals rank agentic AI as the top attack vector heading into 2026. Only 29% of organizations feel fully ready to deploy these technologies securely. Machine identities outnumber human employees 82 to 1 in the average enterprise. And IBM’s 2026 X-Force Threat Intelligence Index documented a 44% surge in attacks exploiting public-facing applications, accelerated by AI-enabled vulnerability scanning.

Nvidia CEO Jensen Huang made the case from the GTC keynote stage on Monday: “Agentic systems in the corporate network can access sensitive information, execute code, and communicate externally. Obviously, this can’t possibly be allowed.”

Nvidia defined a unified threat model designed to flex and adapt for the unique strengths of five different vendors. Nvidia also names Google, Microsoft Security and TrendAI as Nvidia OpenShell security collaborators. This article maps the five vendors with embargoed GTC announcements and verifiable deployment commitments on record, an analyst-synthesized reference architecture, not Nvidia’s official canonical stack.

Advertisement

No single vendor covers all five governance layers. Security leaders can evaluate CrowdStrike for agent decisions and identity, Palo Alto Networks for cloud runtime, JFrog for supply chain provenance, Cisco for prompt-layer inspection, and WWT for pre-production validation. The audit matrix below maps who covers what. Three or more unanswered vendor questions mean ungoverned agents in production.

The five-layer governance framework

This framework draws from the five vendor announcements and the OWASP Agentic Top 10. The left column is the governance layer. The right column is the question every security leader’s vendor should answer. If they can’t answer it, that layer is ungoverned.

Governance Layer

What To Deploy

Advertisement

Risk If Not

Vendor Question

Who Maps Here

Agent Decisions

Advertisement

Real-time guardrails on every prompt, response, and action

Poisoned input triggers privileged action

Detect state drift across sessions?

CrowdStrike Falcon AIDR, Cisco AI Defense [runtime enforcement]

Advertisement

Local Execution

Behavioral monitoring for on-device agents

Local agent runs unprotected

Agent baselines beyond process monitoring?

Advertisement

CrowdStrike Falcon Endpoint [runtime enforcement]; WWT ARMOR [pre-prod validation]

Cloud Ops

Runtime enforcement across cloud deployments

Agent-to-agent privilege escalation

Advertisement

Trust policies between agents?

CrowdStrike Falcon Cloud Security [runtime enforcement]; Palo Alto Prisma AIRS [AI Factory validated design]

Identity

Scoped privileges per agent identity

Advertisement

Inherited creds; delegation compounds

Privilege inheritance in delegation?

CrowdStrike Falcon Identity [runtime enforcement]; Palo Alto Networks/CyberArk [identity governance platform]

Supply Chain

Advertisement

Model scanning + provenance before deploy

Compromised model hits production

Provenance from registry to runtime?

JFrog Agent Skills Registry [pre-deployment]; CrowdStrike Falcon

Advertisement

Five-layer governance audit matrix. Three or more unanswered vendor questions indicate ungoverned agents in production. [runtime enforcement] = inline controls active during agent execution. [pre-deployment] = controls applied before artifacts reach runtime. [pre-prod validation] = proving-ground testing before production rollout. [AI Factory validated design] = Nvidia reference architecture integration, not OpenShell-launch coupling.

CrowdStrike’s Falcon platform embeds at four distinct enforcement points in the Nvidia OpenShell runtime: AIDR at the prompt-response-action layer, Falcon Endpoint on DGX Spark and DGX Station hosts, Falcon Cloud Security across AI-Q Blueprint deployments, and Falcon Identity for agent privilege boundaries. Palo Alto Networks enforces at the BlueField DPU hardware layer within Nvidia’s AI Factory validated design. JFrog governs the artifact supply chain from the registry through signing. WWT validates the full stack pre-production in a live environment. Cisco runs an independent guardrail at the prompt layer.

CrowdStrike and Nvidia are also building what they call intent-aware controls. That phrase matters. An agent constrained to certain data is access-controlled. An agent whose planning loop is monitored for behavioral drift is governed. Those are different security postures, and the gap between them is where the 4% error rate at 5x speed becomes dangerous.

Why the blast radius math changed

Daniel Bernard, CrowdStrike’s chief business officer, told VentureBeat in an exclusive interview what the blast radius of a compromised AI agent looks like compared to a compromised human credential.

Advertisement

“Anything we could think about from a blast radius before is unbounded,” Bernard said. “The human attacker needs to sleep a couple of hours a day. In the agentic world, there’s no such thing as a workday. It’s work-always.”

That framing tracks with architectural reality. A human insider with stolen credentials works within biological limits: typing speed, attention span, a schedule. An AI agent with inherited credentials operates at compute speed across every API, database, and downstream agent it can reach. No fatigue. No shift change. CrowdStrike’s 2026 Global Threat Report puts the fastest observed eCrime breakout at 27 seconds and average breakout times at 29 minutes. An agentic adversary doesn’t have an average. It runs until you stop it.

When VentureBeat asked Bernard about the 96% accuracy number and what happens in the 4%, his answer was operational, not promotional: “Having the right kill switches and fail-safes so that if the wrong thing is decided, you’re able to quickly get to the right thing.” The implication is worth sitting on. 96% accuracy at 5x speed means the errors that get through arrive five times faster than they used to. The oversight architecture has to match the detection speed. Most SOCs are not designed for that.

Bernard’s broader prescription: “The opportunity for customers is to transform their SOCs from history museums into autonomous fighting machines.” Walk into the average enterprise SOC and inventory what’s running there. He’s not wrong.

Advertisement

On analyst oversight when agents get it wrong, Bernard drew the governance line: “We want to keep not only agents in the loop, but also humans in the loop of the actions that the SOC is taking when that variance in what normal is realized. We’re on the same team.”

The full vendor stack

Each of the five vendors occupies a different enforcement point the other four do not. CrowdStrike’s architectural depth in the matrix reflects four announced OpenShell integration points; security leaders should weigh all five based on their existing tooling and threat model.

Cisco shipped Secure AI Factory with AI Defense, extending Hybrid Mesh Firewall enforcement to Nvidia BlueField DPUs and adding AI Defense guardrails to the OpenShell runtime. In multi-vendor deployments, Cisco AI Defense and Falcon AIDR run as parallel guardrails: AIDR enforcing inside the OpenShell sandbox, AI Defense enforcing at the network perimeter. A poisoned prompt that evades one still hits the other.

Palo Alto Networks runs Prisma AIRS on Nvidia BlueField DPUs as part of the Nvidia AI Factory validated design, offloading inspection to the data processing unit at the network hardware layer, below the hypervisor and outside the host OS kernel. This integration is best understood as a validated reference architecture pairing rather than a tight OpenShell runtime coupling. Palo Alto intercepts east-west agent traffic on the wire; CrowdStrike monitors agent process behavior inside the runtime. Same cloud runtime row, different integration model and maturity stage.

Advertisement

JFrog announced the Agent Skills Registry, a system of record for MCP servers, models, agent skills, and agentic binary assets within Nvidia’s AI-Q architecture. Early integration with Nvidia has been validated, with full OpenShell support in active development. JFrog Artifactory will serve as a governed registry for AI skills, scanning, verifying, and signing every skill before agents can adopt it. This is the only pre-deployment enforcement point in the stack. As Chief Strategy Officer Gal Marder put it: “Just as a malicious software package can compromise an application, an unvetted skill can guide an agent to perform harmful actions.”

Worldwide Technology launched a Securing AI Lab inside its Advanced Technology Center, built on Nvidia AI factories and the Falcon platform. WWT’s vendor-agnostic ARMOR framework is a pre-production validation and proving-ground capability, not an inline runtime control. It validates how the integrated stack behaves in a live AI factory environment before any agent touches production data, surfacing control interactions, failure modes, and policy conflicts before they become incidents.

Three MDR numbers: what they actually measure

On the MDR side, CrowdStrike fine-tuned Nvidia Nemotron models on first-party threat data and operational SOC data from Falcon Complete engagements. Internal benchmarks show 5x faster investigations, 3x higher triage accuracy in high-confidence benign classification, and 96% accuracy in generating investigation queries within Falcon LogScale. Kroll, a global risk advisory and managed security firm that runs Falcon Complete as its MDR backbone, confirmed the results in production.

Because Kroll operates Falcon Complete as its core MDR platform rather than as a neutral third-party evaluator, their validation is operationally meaningful but not independent in the audit sense. Industry-wide third-party benchmarks for agentic SOC accuracy do not yet exist. Treat reported numbers as indicative, not audited.

Advertisement

The 5x investigation speed compares average agentic investigation time (8.5 minutes) against the longest observed human investigation in CrowdStrike’s internal testing: a ceiling, not a mean. The 3x triage accuracy measures one internal model against another. The 96% accuracy applies specifically to generating Falcon LogScale investigation queries via natural language, not to overall threat detection or alert classification.

JFrog’s Agent Skills Registry operates beneath all four CrowdStrike enforcement layers, scanning, signing, and governing every model and skill before any agent can adopt it — with early Nvidia integration validated and full OpenShell support in active development.

Six enterprises are already in deployment

EY selected the CrowdStrike-Nvidia stack to power Agentic SOC services for global enterprises. Nebius ships with Falcon integrated into its AI cloud from day one. CoreWeave CISO Jim Higgins signed off on the Blueprint. Mondelēz North America Regional CISO Emmett Koen said the capability lets his team “focus on higher-value response and decision-making.”

MGM Resorts International CISO Bryan Green endorsed WWT’s validated testing environments, saying enterprises need “validated environments that embed protection from the start.” These range from vendor selection and platform validation to production integration. The signal is converging across buyer types, not uniform at-scale deployment.

Advertisement

What the five-vendor stack does not cover

The governance framework above represents real progress. It also has three holes that every security leader deploying agentic AI will eventually hit. No vendor at GTC closed any of them. Knowing where they are is as important as knowing what shipped.

  1. Agent-to-agent trust. When agents delegate to other agents, credentials compound. The OWASP Top 10 for Agentic Applications lists tool call hijacking and orchestrator manipulation as top-tier risks. Independent research from BlueRock Security scanning over 7,000 MCP servers found 36.7% contain vulnerabilities. An arXiv preprint study across 847 scenarios found a 23 to 41% increase in attack success rates in MCP integrations versus non-MCP. No vendor at GTC demonstrated a complete trust policy framework for agent-to-agent delegation. This is the layer where the 82:1 identity ratio becomes a governance crisis, not just an inventory problem.

  2. Memory integrity. Agents with persistent memory create an attack surface that stateless LLM deployments do not have. Poison an agent’s long-term memory once. Influence its decisions weeks later. The OWASP Agentic Top 10 flags this explicitly. CrowdStrike’s intent-aware controls are the closest architectural response announced at GTC. Implementation details remain forward-looking.

  3. Registry-to-runtime provenance. JFrog’s Agent Skills Registry addresses the registry side of this problem. The gap that remains is the last mile: end-to-end provenance requires proving the model executing in production is the exact artifact scanned and signed in the registry. That cryptographic continuity from registry to runtime is still an engineering problem, not a solved capability.

What running five vendors actually costs

The governance matrix is a coverage map, not an implementation plan. Running five vendors across five enforcement layers introduces real operational overhead that the GTC announcements did not address. Someone has to own policy orchestration: deciding which vendor’s guardrail wins when AIDR and AI Defense return conflicting verdicts on the same prompt. Someone has to normalize telemetry across Falcon LogScale, Prisma AIRS, and JFrog Artifactory into a single incident workflow. And someone has to manage change control when one vendor ships a runtime update that shifts how another vendor’s enforcement layer behaves.

A realistic phased rollout looks like this: start with the supply chain layer (JFrog), because it operates pre-deployment and has no runtime dependencies on the other four. Add identity governance (Falcon Identity) second, because scoped agent credentials limit blast radius before you instrument the runtime. Then instrument the agent decision layer (Falcon AIDR or Cisco AI Defense, depending on your existing vendor footprint), then cloud runtime, then local execution. Running all five simultaneously from day one is an integration project, not a configuration task. Budget for it accordingly.

What to do before your next board meeting

Here is what every CISO should be able to say after running the framework above: “We have audited every autonomous agent against five governance layers. Here is what’s in place, and here are the five questions we are holding vendors to.” If you cannot say that today, the issue is not that you are behind schedule. The issue is that no schedule existed. Five vendors just shipped the architectural scaffolding for one.

Advertisement

Do four things before your next board meeting:

  1. Run the five-layer audit. Pull every autonomous agent your organization has in production or staging. Map each one against the five governance rows above. Mark which vendor questions you can answer and which you cannot.

  2. Count the unanswered questions. Three or more means ungoverned agents in production. That is your board number, not a backlog item.

  3. Pressure-test the three open gaps. Ask your vendors, explicitly: How do you handle agent-to-agent trust across MCP delegation chains? How do you detect memory poisoning in persistent agent stores? Can you show a cryptographic binding between the registry scan and the runtime load? None of the five vendors at GTC has a complete answer. That is not an accusation. It is where the next year of agentic security gets built.

  4. Establish the oversight model before you scale. Bernard put it plainly: keep agents and humans in the loop. 96% accuracy at 5x speed means errors arrive faster than any SOC designed for human-speed detection can catch them. The kill switches and fail-safes have to be in place before the agents run at scale, not after the first missed breach.

The scaffolding is necessary. It is not sufficient. Whether it changes your posture depends on whether you treat the five-layer framework as a working instrument or skip past it in the vendor deck.

Source link

Advertisement
Continue Reading

Tech

MacBook Neo, MacBook Air, MacBook Pro: Which to buy in early 2026

Published

on

The MacBook lineup has finished its shift over to the M5 chip generation, and has been joined by the MacBook Neo. Here’s which model you should buy to fit your budget, as of early 2026.

Three open laptops with colorful abstract screens overlap in front of a faint background of U.S. dollar bills, suggesting technology purchases or laptop cost comparison.
MacBook Air [left], MacBook Neo [center], MacBook Pro [right]

Apple’s catalog of products is set up to provide consumers with both something that fits their budget, and an upgrade path that seems very close together. This ranges from a value-focused device like the new MacBook Neo to the bank-busting side with the MacBook Pro.
While this was previously a two-tier system, with the MacBook Air being the entry-level option, the introduction of the MacBook Neo changes things. We now have the entry-level Neo, with Air becoming the mid-tier choice, and the Pro line as the premium and performance option.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

IBM shows off quantum-centric supercomputing that merges processors and classical systems, hinting at scientific breakthroughs and future research applications

Published

on


  • IBM integrates quantum processors with classical supercomputers for coordinated scientific computations
  • Quantum-centric supercomputing allows workloads to switch between CPUs, GPUs, and QPUs
  • Researchers successfully simulated complex molecules using hybrid quantum-classical workflows

IBM has outlined a new reference architecture designed to combine quantum processors with traditional supercomputing infrastructure.

The company describes the concept as quantum-centric supercomputing, an approach intended to connect quantum processing units with GPUs and CPUs within large computing environments.

Source link

Advertisement
Continue Reading

Tech

The Forge Codes (March 2026)

Published

on

Update

Added new The Forge Codes on March 17, 2026.

The Forge is one of Roblox’s newer crafting-heavy RPGs, where players mine resources, forge weapons, and fight enemies while trying to obtain rare gear. As with most Roblox games, The Forge also has a healthy codes system that rewards players with free rerolls and other bonuses that help them improve their character faster. If you’re looking for the latest The Forge codes, you’ve come to the right place. Below, you’ll find all the working codes and instructions for redeeming them.

All New The Forge Codes

  • FORGEWEEKENDS — Redeem for 15x Rerolls  (NEW)

Codes in Roblox games tend to expire quickly, so make sure you redeem them as soon as possible before the developers remove them. Found an expired or missing code? Please let us know, and we’ll update the article as soon as possible.

Expired The Forge Codes

FREE15SPIN SORRYFORDELAYY CRIMSONSAKURA DELAYCOMPENSATION FORGEWEEKEND5
MAZE! FORGWEEKEND! RAVEN HAPPYNEWYEAR FORGE2M
FORG! FREESPINS PEAK! 400K! SORRYFORSHUTDOWN
40KLIKES 20KLIKES 15KLIKES 10KLIKES 5KLIKES

How to Redeem The Forge Codes?

Redeeming codes in The Forge is quick and easy. Just follow these steps:

  1. Open The Forge in Roblox.
  2. Click on the Settings button at the top.
    An arrow pointing to the settings button in The Forge to redeem codes
  3. Scroll to the Codes section.
  4. Type your desired code and hit Redeem.Section to type The Forge codes

That’s it. Your rewards will be automatically added to your inventory. In the meantime, check out the codes for Steal a Brainrot, Uma Racing, and Funky Friday.

Why Are My The Forge Codes Not Working?

There can be plenty of reasons why your code isn’t working, chief among them being that the code has expired. We are not robots, and these articles are maintained by humans, who only work certain hours of the day. Since many Roblox codes only last a short time, it’s possible that a code expired between the time of writing this article and when you tried to redeem it.

Beyond that, it’s possible you’ve typed the code wrong. They are case-sensitive, meaning even a small spelling error will cause them to fail. So, double-check your spelling, or simply copy and paste from the article. Sometimes new codes appear after updates, but they may take a few minutes to activate across servers. If that happens, try restarting the game and redeeming the code again.

Advertisement

How to Get More The Forge Codes?

Discord invite section of The Forge

The easiest way to find new The Forge codes is to bookmark this page. We regularly check for updates and add new codes as soon as they appear. You can also join the official The Forge Discord server, where the developers usually post announcements and new codes first. The dedicated codes channel is the best place to watch for future rewards.

Developers usually release new codes when a game reaches major milestones, such as a high player count, new updates, bug fixes, and seasonal events or holidays. So, we recommend keeping an eye out for these.

What Is The Forge in Roblox?

A character from The Forge forging a weapon

For those new to the game, The Forge is a crafting-focused RPG on Roblox where players mine resources, forge weapons, and fight enemies to obtain rare items. Unlike many other Roblox RPGs, the game puts heavy emphasis on crafting mechanics. Players can create their own equipment using mined materials and enhance their builds through race rerolls and powerful items. Because of this system, The Forge codes are extremely helpful early in the game since rerolls can significantly change your build.

Source link

Continue Reading

Tech

Microsoft revamps Copilot structure, elevating former Snap exec as Suleyman shifts to AI models

Published

on

Mustafa Suleyman, CEO of Microsoft AI, will shift his focus to building frontier AI models and leading the company’s superintelligence efforts under a reorganization announced Tuesday. (GeekWire File Photo / Kevin Lisota)

Microsoft is reorganizing its Copilot organization, unifying its consumer and commercial AI efforts under former Snap executive Jacob Andreou while narrowing the role of Microsoft AI leader Mustafa Suleyman to focus on the superintelligence and frontier models.

The news, announced Tuesday by Microsoft CEO Satya Nadella, is a new attempt by the company to gain traction as AI shifts from chatbots that converse with users to agents that take action on their behalf. It’s the latest shakeup in the company’s executive ranks. 

Microsoft 365 Copilot had 15 million paying users at last count, about 3% of the overall user base for the enterprise platform. Estimates from Statcounter show Copilot with a low‑single‑digit share of global AI chatbot usage, well behind its partner OpenAI’s ChatGPT.

“This is how we move from a collection of great products to a truly integrated system, one that is simpler and more powerful for customers,” Nadella said in an email to employees about the changes, published by the company on its website.

Andreou joined Microsoft last year from Snap, where he spent eight years and rose to senior vice president. As corporate vice president of product and growth at Microsoft AI, he has been leading the consumer Copilot effort. As executive vice president of the combined Copilot group, he will report directly to Nadella, leading overall design, product, growth, and engineering.

Advertisement

Suleyman, a co-founder of DeepMind, joined Microsoft as CEO of AI when the company brought over most of the team from his AI startup Inflection AI in 2024.  He will continue reporting to Nadella but shift his focus to building frontier AI models. 

Microsoft formed a Superintelligence team under Suleyman in November, and Tuesday’s restructuring effectively makes that his primary mandate.

In his email to staff, Suleyman said the restructuring will allow him to commit fully to the company’s superintelligence efforts and deliver models over the next five years that improve products and reduce the cost of running AI workloads at scale.

Microsoft 365 apps and the Copilot platform will be led by Ryan Roslansky, CEO of LinkedIn; Perry Clarke, who leads Microsoft 365 core infrastructure; and Charles Lamanna, who oversees business and industry Copilot. Together with Andreou and Suleyman, they will form a new Copilot Leadership Team.  

Advertisement

Roslansky, Clarke and Lamanna began reporting directly to Nadella earlier this month as part of the succession plan for Rajesh Jha, the longtime executive vice president who is retiring after more than 35 years at the company.

Source link

Continue Reading

Trending

Copyright © 2025